Share this Job

Cyber Security Specialist (Progression) - Security Engineering Focused

Date: Jun 10, 2022

Location: Ybor City, Florida, US, 33605

Company: TECO

Title: Cyber Security Specialist (Progression) - Security Engineering Focused 
Company: Tampa Electric Company
Location: Ybor Data Center 
State and City: Florida  -  Ybor City
Shift: 8 Hr. X 5 Days

Hiring Manager:  Jose L Valdes

Recruiter: Mark E Koener 

 

 

 

TITLE:   Cyber Security Specialist (Progression) - Security Engineering Focused
PERFORMANCE COACH:   Manager, Cyber Security Operations Center
COMPANY:   TECO Services, Inc.
DEPARTMENT:   Cyber Security


This is a multi-level position and the salary range for this position varies and is commensurate with skills, experience, and education.

 

This position will work withing the TECO Cyber Security team and will be focused on the security engineering aspects to support the team. Applicant should be familiar with providing engineering support to cyber security tools and applications.

 

POSITION CONCEPT
The Cyber Security Specialists are responsible for monitoring the company’s information security systems, ensuring that all procedures are followed on a daily, weekly, monthly, and annual basis.  Additionally, this position provides expert-level support, within a team environment, for systems used to monitor and protect the enterprise assets.  Also tasked with detecting, analyzing, and responding to any suspicious cyber security activity across TECO/Emera business and operational networks.  The scope includes all network infrastructure, operating systems, and web server platforms throughout TECO Energy and its subsidiaries.

Cyber Security Specialists develop and possess an in-depth understanding of exploits (e.g., malware) and vulnerabilities, resolving issues by taking the appropriate corrective action, or following the appropriate escalation procedures.  This entails proactively identifying and assessing threats to TECO’s network and data, monitors TECO’s network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.  The responsibilities include assessing enterprise assets to include critical assets for secure configurations and maintaining and enforcing regulations regarding NERC Critical Infrastructure Protection (CIP), Sarbanes-Oxley (SOX), PCI, and corporate information security standards.

 

Please keep in mind that these are the minimum requirements for a Cyber Security Specialist Associate. This position does have various levels, so if an applicant meets more of the preferred skills, they may qualify for a higher-level position within the Cyber Security Specialist job family


RELATIONSHIPS

Key Internal:    Engaging multiple IT groups and business units, including Energy Supply, Energy Delivery, and Regulatory Affairs.  Interactive engagement will require communication with individual contributors, middle management, and executive management.

Key External:     Engaging external contacts including vendors, contractors, regulatory agencies, law enforcement, industry associations, and other utility partners.

 

LEVEL 1 – CYBER SECURITY SPECIALIST ASSOCIATE
Monitor and respond to cyber security threats and/or events generated by various security tools.  Assists with analyzing cyber security incidents, conducting digital forensics and evaluating the effectiveness of in-place security controls.  Works under general supervision. 

PRIMARY DUTIES AND RESPONSIBILITIES INCLUDE, BUT ARE NOT LIMITED TO, THE FOLLOWING:
•    Monitor and respond to security threats and/or events generated by various security monitoring tools/technologies for the enterprise network.  Determine if anomalies are actual system compromises.  Escalate significant threats/events to 2nd or 3rd tier support for deeper analysis.  This is to ensure all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment. (35%)
•    Conduct digital forensics by collecting computer/network-related evidence in support of policy violations, criminal activity, fraud, and in response to threat intelligence, law enforcement investigations, or information technology (IT) audit efforts (NERC CIP, SOX, PCI, etc.).  Additionally, conducts malware analysis to gather relevant indicators of compromise (IOCs) for active hunting and continuous monitoring for installed toolsets. (25%)
•    Translates all applicable standards and requirements (NERC CIP, NIST 800-171, NIST 800-53, PCI-DSS, SOX, etc.) into appropriate systemic and procedural solutions to enable compliance adherence.  Coordinate and communicate necessary actions to maintain compliance with applicable internal and regulatory standards.  Assist in the development and enforcement of company policies, procedures, desk level procedures, disaster recovery plans, processes, plans and standards that support and facilitate governmental and regulatory compliance.  Assist in the development of management responses to internal/external government and regulatory audits and data requests in conjunction with respective management and staff. (10%)
•    Evaluate the effectiveness of in-place security controls to constantly strengthen the overall security posture.  Recommend implementation of counter measures or mitigating controls as well as contribute to design, implement, and maintain security tools, systems, and technologies leveraged by the CSOC or NERC CIP program. (10%)
•    Monitor external event sources for security intelligence and actionable incidents. (10%)
•    Develop and maintain threat/risk metrics, security processes, and desk level procedures. (10%)


QUALIFICATIONS

Education

Required:     High School Diploma.

Preferred:    Bachelor’s Degree in Computer Science, Information Systems, or other IT related discipline.


Licenses/Certifications

Required:    From the list of certification vendors, one related Information Security professional certification or ability to obtain via self-study within one year of hire date
(ex.: (ISC)2, GIAC, ISACA, CompTIA, e-Council, etc.).

Preferred:    ITIL v3 and one or more of the following or similar Information Security professional certifications (ex: ACE, CCE, CEH, CISA, CISM, CISSP, CRISC, EnCE, GCCC, GCDA, GCED, GCFA, GCFE, GCIA, GCIH, GCWN, GICSP, GMON, GNFA, GPEN, GPPA, GREM, GWAPT, GXPN, OSCP, SSCP).


Related Experience

Required:    A minimum 5 years of related Cyber Security, IT, or Technical (hands-on networking, telecommunications [radios, satellites, communications, etc.], hardware, software) experience.  In lieu of some experience listed above, may consider 3 years related experience with a Bachelor Degree in Computer Science, Information Systems or other IT related discipline.


Knowledge/Skills/Abilities (KSA) 

Required:     
•    Good working knowledge of major operating system security (Windows, Mac OS, Linux/Unix), web server security, and network security. 
•    Good working knowledge of major security systems and functions for incident response, monitoring and forensic activities: Firewalls, IDS/IPS, Antivirus/Antimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.
•    Good working knowledge of log, network, and system forensic investigation techniques. 
•    Basic working knowledge of networking protocols and systems administration.
•    Basic working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
•    Basic working knowledge with packet analysis and malware analysis.
•    Basic working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.
•    Good analytical and risk assessment skills as well as strong listening, written and computer communication skills for reporting and auditing purposes.

Preferred:    
•    Good working knowledge of major security systems and functions for incident response, monitoring and forensic activities: Firewalls, IDS/IPS, Antivirus/Antimalware, SIEM, Incident Response, Threat Prevention, Web/Application Control Filtering, Email Filtering, NetFlow Analysis, Endpoint Security, Configuration and Change Management, File Integrity Monitoring, and DLP.
•    Good working knowledge of networking protocols and systems administration. 
•    Good working knowledge of identifying and capturing indicators of compromise and methods for detecting them within incidents.
•    Good working knowledge with packet analysis and malware analysis.
•    Good working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX and PCI.
•    Basic knowledge of penetration testing technologies and procedures. 
•    Basic knowledge with reverse engineering malware. 
•    Strong analytical and risk assessment skills as well as strong listening, written and computer communication skills for reporting and auditing purposes.

 

#LI-SAC

TECO offers a competitive Benefits package!!

Competitive Salary *401k Savings plan w/ company matching * Pension plan * Paid time off* Paid Holiday time * Medical, Prescription Drug, & Dental Coverage  *Tuition Assistance Program * Employee Assistance Program * Wellness Programs * On-site Fitness Centers * Bonus Plan and more!

 

STORM DUTY REQUIREMENTS....Please make sure to read below!!!  Responding to storms will be considered a condition of employment.

TECO Energy and its companies serve a role in providing critical services to our community during an emergency. Team members are required to participate in the response/recovery activities related to emergencies/disasters to maintain service to our TECO Energy customers. Team members are required to work in their normal job duties or other assigned activities. Proper compensation will be made in accordance with the company's rules and procedures.

 

TECO Energy is proud to be an Equal Opportunity Employer.

TECO Energy is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability status, veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by law, except where physical or mental abilities are a bona fide occupational requirement and the individual is unable to perform the essential functions of the position with reasonable accommodations.

In order to provide equal employment and advancement opportunities for all individuals, employment decisions at TECO Energy will be based on skills, knowledge, qualifications and abilities.

Pay Transparency Non-Discrimination Statement
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)

ADA policy
It is the policy of TECO Energy to provide reasonable accommodation for all qualified disabled individuals who are employees and applicants for employment, unless it would cause undue hardship. The corporation will adhere to applicable federal and state laws, regulations and guidelines, including, but not limited to the Americans with Disabilities Act (ADA) of 1990 and section 503 and 504 of the Rehabilitation Act of 1970s.

 

Application accommodations
Applicants may request reasonable accommodation in the application process five business days prior to the time accommodation is needed.

 

Pre-employment physical exams may be required for positions with bona fide job-related physical requirements regardless of disability. 

 

 


Nearest Major Market: Tampa

Job Segment: Information Security, Information Systems, Telecom, Telecommunications, Data Center, Technology